MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WHICH_OF_THEM_IS_AN_EXAMPLE_OF_GRABBING_EMAIL_INFORMATION??$ |
| A. | Cookie stealing |
| B. | Reverse engineering |
| C. | Port scanning |
| D. | Banner grabbing |
| Answer» B. Reverse engineering | |
| 2. |
WHICH_OF_THE_FOLLOWING_IS_A_NON-TECHNICAL_TYPE_OF_INTRUSION_OR_ATTACK_TECHNIQUE??$ |
| A. | Reverse Engineering |
| B. | Malware Analysis |
| C. | Social Engineering |
| D. | Malware Writing |
| Answer» D. Malware Writing | |
| 3. |
Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.$ |
| A. | trojans, redirected malicious URLs |
| B. | antivirus, patches |
| C. | cracked software, redirected malicious URLs |
| D. | malware, security patches |
| Answer» B. antivirus, patches | |
| 4. |
_____________ is the technique used for tricking users to disclose their username and passwords through fake pages.$ |
| A. | Social Engineering |
| B. | Phishing |
| C. | Cookie Stealing |
| D. | Banner Grabbing |
| Answer» C. Cookie Stealing | |
| 5. |
Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords. |
| A. | credit card, antivirus name |
| B. | credit card, login ID |
| C. | cell phone, antivirus name |
| D. | car model, account ID |
| Answer» C. cell phone, antivirus name | |
| 6. |
Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
Unsolicited Bulk E-mails (UBI) are called __________ |
| A. | SMS |
| B. | MMS |
| C. | Spam emails |
| D. | Malicious emails |
| Answer» D. Malicious emails | |
| 8. |
If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie? |
| A. | memory |
| B. | quarantine |
| C. | cookies |
| D. | hard drive |
| Answer» D. hard drive | |
| 9. |
The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans. |
| A. | attackers, malware |
| B. | hackers, antivirus |
| C. | penetration testers, malware |
| D. | penetration testers, virus |
| Answer» B. hackers, antivirus | |
| 10. |
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 11. |
Which of them is not a proper method for email security? |
| A. | Use Strong password |
| B. | Use email Encryption |
| C. | Spam filters and malware scanners |
| D. | Click on unknown links to explore |
| Answer» E. | |
| 12. |
_____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. |
| A. | Cloud |
| B. | Pen drive |
| C. | Website |
| D. | |
| Answer» E. | |
| 13. |
____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise. |
| A. | Email security |
| B. | Email hacking |
| C. | Email protection |
| D. | Email safeguarding |
| Answer» B. Email hacking | |
| 14. |
Which of them is not a major way of stealing email information? |
| A. | Stealing cookies |
| B. | Reverse Engineering |
| C. | Password Phishing |
| D. | Social Engineering |
| Answer» C. Password Phishing | |
| 15. |
There are _______ major ways of stealing email information. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |